Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1800s -
max time network
1687s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
16/05/2023, 05:17
Behavioral task
behavioral1
Sample
rufus-3.22.exe
Resource
win7-20230220-en
5 signatures
1800 seconds
General
-
Target
rufus-3.22.exe
-
Size
1.4MB
-
MD5
f3a93569ce2aa9409e2ffba3d7edb4db
-
SHA1
f68e9d61523742e40ff2760972feb40286bdef55
-
SHA256
ac2a1743bbfc19268c36280b50a003366d41854863d4808099cd87f77fa5f433
-
SHA512
e273fdf72f1e793f0e64d4f3e1a806ab4ef5a8ad408ba7ae3c2b076ac23bbd1b9119523cafeb5e192434a0f346295466fc22237ed2126ed8e55e0f8da6d242d9
-
SSDEEP
24576:hqGBPKaIPx+wa6cu0gQYBGHsk/ujEsLKhN33sYhXvDW2VIPIwzxcbMycXJnGjTXB:kGBPKaX5TkWnU5KhyaDHYIoHXcB
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1096-63-0x0000000000D90000-0x0000000001185000-memory.dmp upx behavioral1/memory/1096-64-0x0000000000D90000-0x0000000001185000-memory.dmp upx behavioral1/memory/1096-68-0x0000000000D90000-0x0000000001185000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rufus-3.22.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol rufus-3.22.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI rufus-3.22.exe File opened for modification C:\Windows\System32\GroupPolicy rufus-3.22.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini rufus-3.22.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 1096 rufus-3.22.exe Token: SeLoadDriverPrivilege 1096 rufus-3.22.exe Token: SeLoadDriverPrivilege 1096 rufus-3.22.exe Token: SeLoadDriverPrivilege 1096 rufus-3.22.exe Token: SeLoadDriverPrivilege 1096 rufus-3.22.exe Token: SeLoadDriverPrivilege 1096 rufus-3.22.exe Token: SeLoadDriverPrivilege 1096 rufus-3.22.exe Token: SeLoadDriverPrivilege 1096 rufus-3.22.exe Token: SeLoadDriverPrivilege 1096 rufus-3.22.exe Token: SeLoadDriverPrivilege 1096 rufus-3.22.exe Token: 33 396 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 396 AUDIODG.EXE Token: 33 396 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 396 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1096 rufus-3.22.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\rufus-3.22.exe"C:\Users\Admin\AppData\Local\Temp\rufus-3.22.exe"1⤵
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1096
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1812
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:1984
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1708
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5841⤵
- Suspicious use of AdjustPrivilegeToken
PID:396